

The feet!
The feet!
Pff. You really think food grows on trees?
I looks like it’d like to tell something personal but it is feeling shy. Poor thing.
Please spread this message to more advanced Software engineers who understand “BYTECODE” HIDING and exe construction IN OPENSOURCE SCRIPTS AND HAVE THEM TAKE A LOOK AT IT!
I believe chain letter is the word?
The pig belongs to all mankind!
Exposing Jellyfin/ plex through routing or SNAT plus dyndns would be a cheap option.
As soon as one rents a VPS (to expose the selfhosted at home service through routing/ tunneling) it would cost at least 2€/ month?
Damn. Another rabbit hole to dive into. Thanks… I guess. :)
The lua queries look promising.
Have fun. :)
Side note: Never look at LXC/incus or home assistant or esp32 to attach. Rabbit holes everywhere.
Yes, broad is fine. It’s interesting to see the different approaches. :) I’m sorry if I sounded too harsh.
My understanding was that Germany’s issue is with uploading as well, but I am not German and I am not a lawyer
Lawyer? Me neither.
Indeed. Uploading is problematic, which includes p2p. Downloading not so much. Still illegal though.
There was the story about witcher and CD project who targeted illegal users. Understandably. So downloading isn’t exactly 100% safe. Or using the downloads…
Distribution is the key here, which they can pinpoint to your IP. They can’t come after YOU specifically (usually) but they contact your ISP
Germany:
Which in turn hands out your contact data. And Waldorf + Frommer will send you a form for a Unterlassungserklärung, which you are kindly asked to sign. Plus they will kindly ask for a few hundred euros.
Who then sends you a strongly worded letter about stopping (usually). If this happens repeatedly they will often throttle your bandwidth or even cut you off. Again, usually. This is different everywhere.
Nope. Not the ISPs job here.
In your case: no need for a fw if you can trust your local network.
Generally: services can have bugs - reverse proxy them. Not everybody needs to access the service - limit access with a firewall. Limit brute-force/ word-list attempts - MFA / fail2ban.
You’re cute when you are angry.
It has a superset of features compared to the Explorer - Meaning it can do all the things that the explorer can do plus more.
I’m simply used to the two window layout since the old ages of Norton Commander ( Yes, Norton used to create useful products back then.). For me it is about hotkeys for functions ( Select, Filter, Copy, paste, move, delete). A multi rename tool. A search for file contents. A copy queue.
I do not use it for everything, but sometimes it’s simply better than the standard windows tools.
slightly over-koalafied for this role, I would say.
Sorry. Out, you say? That door?.. OK.
Arr. 🦜
Huh. You’re right. :)
I’m always unsure where suffering or health issues from brachycephaly (short head) start and what is uncritical healthwise.
I mean, they look healthy… :)
Your distant ancestors were wolves. You have come far. :)
Tripwire and auditd can monitor a filesystem and notify you about changes. I don’t know the tools myself, because i never needed them. Maybe these can give you a hint on the responsible service.
If you suspect a certain service to be responsible: what do the logs of the service say? If nothing: increase the loglevel to info or debug?
Sorry. No solution. Just ideas. Good luck.